US11715309B2 - Method for producing security elements in an image which are not visible to the human eye and cannot be copied, and printed image - Google Patents

Method for producing security elements in an image which are not visible to the human eye and cannot be copied, and printed image Download PDF

Info

Publication number
US11715309B2
US11715309B2 US16/973,071 US201916973071A US11715309B2 US 11715309 B2 US11715309 B2 US 11715309B2 US 201916973071 A US201916973071 A US 201916973071A US 11715309 B2 US11715309 B2 US 11715309B2
Authority
US
United States
Prior art keywords
color
serial number
halftone
printing
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US16/973,071
Other versions
US20210245542A1 (en
Inventor
Jörg Kaufmann
Frank Theeg
Holger Zellmer
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AuthenticNetwork GmbH
Original Assignee
AuthenticNetwork GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AuthenticNetwork GmbH filed Critical AuthenticNetwork GmbH
Assigned to INDUSTRY365 UG (HAFTUNGSBESCHRÄNKT) reassignment INDUSTRY365 UG (HAFTUNGSBESCHRÄNKT) ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: THEEG, Frank, ZELLMER, HOLGER, Kaufmann, Jörg
Publication of US20210245542A1 publication Critical patent/US20210245542A1/en
Assigned to AUTHENTIC.NETWORK GMBH reassignment AUTHENTIC.NETWORK GMBH CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: INDUSTRY365 UG (HAFTUNGSBESCHRÄNKT)
Application granted granted Critical
Publication of US11715309B2 publication Critical patent/US11715309B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/80Recognising image objects characterised by unique random patterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0047Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K15/00Arrangements for producing a permanent visual presentation of the output data, e.g. computer output printers
    • G06K15/02Arrangements for producing a permanent visual presentation of the output data, e.g. computer output printers using printers
    • G06K15/18Conditioning data for presenting it to the physical printing elements
    • G06K15/1835Transforming generic data
    • G06K15/1836Rasterization
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K15/00Arrangements for producing a permanent visual presentation of the output data, e.g. computer output printers
    • G06K15/02Arrangements for producing a permanent visual presentation of the output data, e.g. computer output printers using printers
    • G06K15/18Conditioning data for presenting it to the physical printing elements
    • G06K15/1867Post-processing of the composed and rasterized print image
    • G06K15/1872Image enhancement
    • G06K15/1881Halftoning
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/005Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/005Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations
    • G07D7/0054Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations involving markings the properties of which are altered from original properties
    • G07D7/0055Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations involving markings the properties of which are altered from original properties involving markings displaced slightly from original positions within a pattern
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/2008Testing patterns thereon using pre-processing, e.g. de-blurring, averaging, normalisation or rotation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/202Testing patterns thereon using pattern matching
    • G07D7/2033Matching unique patterns, i.e. patterns that are unique to each individual paper
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00838Preventing unauthorised reproduction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00838Preventing unauthorised reproduction
    • H04N1/00856Preventive measures
    • H04N1/00864Modifying the reproduction, e.g. outputting a modified copy of a scanned original
    • H04N1/00867Modifying the reproduction, e.g. outputting a modified copy of a scanned original with additional data, e.g. by adding a warning message
    • H04N1/0087Modifying the reproduction, e.g. outputting a modified copy of a scanned original with additional data, e.g. by adding a warning message with hidden additional data, e.g. data invisible to the human eye
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32203Spatial or amplitude domain methods
    • H04N1/32251Spatial or amplitude domain methods in multilevel data, e.g. greyscale or continuous tone data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32203Spatial or amplitude domain methods
    • H04N1/32256Spatial or amplitude domain methods in halftone data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32352Controlling detectability or arrangements to facilitate detection or retrieval of the embedded information, e.g. using markers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0051Embedding of the watermark in the spatial domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/95Pattern authentication; Markers therefor; Forgery detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • H04N2201/3235Checking or certification of the authentication information, e.g. by comparison with data stored independently
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/328Processing of the additional information
    • H04N2201/3281Encryption; Ciphering

Definitions

  • the invention relates to a method for producing security elements in an image which are not visible to the human eye and cannot be copied, as well as printed images according to the preamble of the first and eleventh claim.
  • the publication WO 03/007252 A1 describes a method in which a uniquely assigned random code is used to prove originality.
  • This code is applied to the product or the corresponding packaging and stored in a central database.
  • This central database is accessible via the internet and the customer can enter the corresponding code in an online mask after purchasing a product and thus inquire about the authenticity of the product. If the entered code is not contained in the database, it is a fake. If the code exists in the database and if the code has already been queried before, it is not possible to prove unequivocally which product is the original and whether the product was queried twice. A counterfeit of the product including the code cannot be excluded.
  • a more cost-effective solution for implementing copy protection is disclosed in the publication DE 10 2013 019 675 B3.
  • This publication relates to a method for the acquisition and reproduction of information which is applied to the surface of information carriers of advertising and/or information media by means of display elements.
  • the purpose of the invention is to enable digital communication by means of data elements on information carriers.
  • representation elements of a textual and/or pictorial overall representation are recorded by means of a scanner and an encrypted connection code is decoded.
  • connection code On the basis of this connection code, the access to a database and the comparison of the identical existing physical information with the identical information in a database takes place.
  • the disadvantage of this solution is that by copying the physical information and attaching it to a counterfeit product, the counterfeit product is recognized as original.
  • DE 10 2015 009 123 A1 publishes a method for checking the authenticity of the designation of origin and shelf-life indications of products.
  • a design surface with an individual security code and a mark is applied to the product.
  • the individual security code can be decoded by a scanner.
  • a data connection to a database is established.
  • the information on the mark and code is compared and a query code based on a mathematical formula is transmitted to the scanning device. Only if the mark, code and query code match, an original product is present.
  • the scan code is renewed with every scan, so that only the scanning device that made the last scan knows the current scan code.
  • the disadvantage of this solution is that the scan code must be transmitted separately from the original product. If the scan code is lost, the originality of the product can no longer be proven.
  • the publication DE 10 2015 006 008 A1 relates to an invention of a method for checking the authenticity of security features on printed and 3D value objects such as checks, vouchers and certificates.
  • the security of the detection of forgeries is to be significantly increased above the level of the patents known from the prior art.
  • the value object is identified and it is defined where the security features are located on this value object.
  • the two- and three-dimensional security features on the object are recorded by a camera.
  • the determined values are then sent to a comparison station.
  • the comparison station compares the detected features with the stored features.
  • the comparison result is then sent back to the scanning device and a statement is made about the authenticity of the object. It is essential that the data is transmitted in encrypted form using a hash function and that at least one 3D security feature is attached to the value object.
  • the procedure of this method is provided in several steps:
  • edges of the value object are detected by means of the auto focus function. Afterwards, the optical elements within the edges (boundary surfaces) of the value object are captured and recorded in two dimensions. Afterwards, the display elements with security features are selected using predefined surfaces and patterns.
  • the selected features are compared with the stored values.
  • the detected values are then compared with the security features in a comparison station.
  • the increase in security according to this publication is based on a code, which is produced by means of a coding device and to which value objects are additionally attached.
  • This code is, for example, the serial number of the value object.
  • the transmission of the code between the scanning device and the comparison station is carried out by means of another coding based on a hash function, so that the code cannot be counted back.
  • the comparison station the value stored there by means of the identical hash function is then compared with the scanned value that is available as a hash value.
  • WO 2017/137155A1 describes a method for the verification of an object provided with a security feature, wherein the security element is manufactured in a multi-step process with register variations.
  • register variation a superposition of at least two dot or line grids is used.
  • the resulting moiré grids are used to determine a check value which is compared with a reference value for verification.
  • several printing processes are used and check digits are stored in selected areas.
  • the creation of moiré structures which can be read out optically, is used.
  • the grid manipulation is realized by register variations at the printing press and is unavoidable due to the proposed use of different printing processes and serves as a kind of fingerprint to prove the authenticity of the respective print products.
  • the banknote to be verified is photographed using a mobile computer device and a corresponding program (application).
  • the serial number is then digitized by means of OCR recognition and the minimum and maximum distances of the register shift are used to determine the moiré grid and from this the check value of the banknote.
  • the app then establishes a connection to a database and transfers the serial number and the check value to the database.
  • the check value and the serial number are compared and the result of the test is transmitted back to the app, which displays the result of the authenticity check accordingly. It is also suggested to further secure the system by applying an additional barcode.
  • the change of the partial areas of the marking layer under illumination with visible light and in daylight intensity should not be perceptible with the human eye, but only determined with the help of technical aids, such as magnifying glasses, detectors, etc.
  • a laser sweeps over the partial areas shown in a predetermined path, which in turn are determined by the predetermined path of the laser beam.
  • Local pyrolysis occurs in the partial areas due to the strong absorption of the laser radiation in the laser-sensitive pigment and its immediate surroundings (diameter up to 10 ⁇ m around the center of a laser-sensitive pigment).
  • the publication DE 10 2013 107 951A1 describes a method for verifying the authenticity of a document using at least one piece of additional information, wherein the document has an information feature that refers to the additional information.
  • An image of the document is recorded, the information feature in the recorded image is recorded, the additional information is determined on the basis of the recorded information feature and the recorded image is displayed together with the additional information in order to verify the authenticity of the document.
  • the invention involves a method for producing security elements in an image which are not visible to the human eye and which cannot be copied, in particular for checking the authenticity of images.
  • the image is imaged by means of a halftone, the halftone consisting of individual image dots arranged adjacent to each other. This is characterized in that at least one field having a random geometric shape or freeform is defined in the image/the halftone.
  • the image is reproduced by means of a halftone image, wherein the halftone image consists of individual dots and, according to the invention, at least one field is defined in the image/halftone image, wherein, by means of manipulation of dots in the field and/or by means of manipulation of the entire field, encrypted information that cannot be copied is stored for comparison with at least one database and a serial number is represented by means of contours introduced into the halftone image, wherein each contour is assigned a digit of the serial number and wherein the serial number can be represented in any desired numerical system.
  • the image can be in the form of a company logo or as a supplementary representation.
  • the invention therefore relates to a system for the authentication of objects, wherein both the verification procedure and associated computer products for carrying out the authentication and the necessary security elements are provided with the objects to be secured.
  • Various objects of daily life such as branded products, clothing, documents, machine elements, food as well as value and identification documents are provided with a non-copyable security element. This means that the objects are uniquely identifiable and can no longer be duplicated or copied without permission. In the event of an attempted forgery, the security element is falsified and is no longer recognizable.
  • the invention represents an authentication method, which is a multi-step method that optically encrypts an at least binary serial number in an image by varying the screening of full and halftone areas in previously defined regions.
  • the image is produced using duplex, four- or multi-color printing or hexachrome printing, letterpress, gravure, planographic printing, through-printing, non-impact printing, 3D printing or a combination of at least two printing processes.
  • 3D printing is layered, individual layers and/or partial areas may have a different structure, orientation or shape in the form of fields, which are used to store information for comparison with a database.
  • a graphic available as an RGB file or in another color space is rasterized in the RIP process to preferably 4 colors (C—Cyan, M—Magenta, Y—Yellow, K—Black).
  • C C or special colors such as G—Green
  • detection via digital cameras is detectable.
  • special colors, lacquers, luminescent colors or electromagnetically reacting colors can be used as a substitute or supplementary color component, wherein the maximum number is not limited.
  • areas are defined for the optical application of a random or arbitrary serial number.
  • the contour and size of the areas is completely free and can consist of circles and/or triangles, rectangles, trapeziums, squares, various polygons or freeform surfaces.
  • Each area stands for one digit of the serial number. Which area stands for which position of the serial number is displayed in previously defined areas and the part of the serial number shown there.
  • the sequence in which the individual digits of the serial number are merged and the hash function used for encryption is determined over at least one defined area by means of the parameters grid change and/or contour.
  • the information of the serial number is displayed, which is binary in the preferred variant, i.e. the ranges can assume two states:
  • Grid inside a field is identical to grid outside a field or the area inside the field and outside differ.
  • One of these states is defined in the binary procedure with a 0 (false), one state with a 1 (true).
  • the halftone angle of two of the four colors (CMYK) is partially exchanged.
  • the modified graphic is printed using a printing process such as ink jet, laser, offset, gravure, flexo, screen printing or similar, or other digital or analog printing techniques.
  • the printing substrate can be chosen at will and ranges from paper to plastics and other natural materials such as wood, stone or artificially produced substrates.
  • the form of the printing substrate is also freely selectable and ranges from thread-like structures such as yarns to 2D-structures like paper and foils to 3D structures like parts and components.
  • CMYK data preferably with partially exchanged K and M halftones
  • CMYK data preferably with partially exchanged K and M halftones
  • correspondingly otherwise manipulated data sets in different color spaces or color combinations with further color combinations are sent to the printing device instead of the usual CMYK data created and screened from the print data or corresponding data sets in different color spaces with further color combinations.
  • step 5 the at least binary serial number is transformed using a hash function. Which hash function is used was defined in step 2 and is part of the serial number.
  • the at least one binary serial number and the transformed information (hash value) are then stored in at least one database and assigned to a container with a further serial number and supplemented by further product data (brand, name, production location, production time, size, color, text length, etc.).
  • step 6 the container is filled.
  • step 5 is carried out at least once. Preferably, however, this is carried out much more often, for example in the range of 4 k to 20 k, wherein there is no maximum number.
  • the container is filled with hash values
  • the container itself is encrypted or transformed in a step 7.
  • the so-called Merkle tree procedure is used here, i.e. two hash values of a serial number are always transformed with a defined hash function to a new hash value and thus combined.
  • the resulting new hash value is stored in the database and then two already combined hash values of serial numbers are transformed again with a hash function (identical or changed). This step is repeated until a single hash value is available for the whole container.
  • the encryption path and the hash functions used are also stored in the database and a so-called Merkle path of the container is created.
  • this final hash value of the container is written to at least one blockchain (preferably a public blockchain).
  • the unalterable storage of the container hash value is completed and each person can publicly read out which hash values exist from the container. Since the hash functions represent an asymmetric encryption and thus a transformation, it is not possible to infer from the publicly available container hash values the combined hash values of the Merkle tree or the hash values of the serial numbers or the respective serial numbers per se.
  • the security feature printed in step 4 is recorded with a mobile device, such as a cell phone, camera, tablet, SmartWatch or similar, and further processed in respect of data processing in step 9.
  • a mobile device such as a cell phone, camera, tablet, SmartWatch or similar
  • a cell phone is used for this purpose on which a special application (software) is installed or integrated into the firmware of the cell phone.
  • the app is opened or the camera function with integrated app is started and the security element is recorded in the form of a security feature. If the camera with integrated app is active in standby mode, it is sufficient for the camera to automatically detect the presence of a security feature.
  • the RGB image is further processed in step 9a, i.e. a combination of color filters and transformations, such as Fourier transformations, is applied to determine the information content for each individual field of the security feature. In the binary case this is a 0 or 1 or true and false.
  • step 9b the first part of the serial number is determined in at least one field, which describes the structure of the serial number and the hash function used to transfer the serial number to the database.
  • step 9c the serial number is composed according to step 9b and encrypted with the corresponding hash function in step 9d.
  • step 9e the transformed serial number is sent to the database and the Merkle path stored for this hash value is determined according to step 9f.
  • the database consists either of a server accessible via the internet or of a combination of several servers or autonomously operating nodes (nods).
  • the corresponding container hash is determined by the Merkle tree procedure in a step 9g.
  • step 9h the comparison with at least one blockchain is carried out, wherein it is checked whether the determined container hash is present there.
  • step 9h case 1 If the container hash is not present, the product is counterfeit and a corresponding error message is transmitted to the mobile device, which outputs this optically and/or acoustically (step 9h case 1).
  • the container hash is contained in the blockchain, the information: “Product is genuine” is transmitted to the mobile device and this is displayed visually and/or acoustically.
  • additional product parameters such as production date, production location, size, color, etc. are read from the database and transmitted to the mobile device as additional information (step 9h case 2).
  • the customer can now make a visual comparison with the product. If the data transmitted from the database does not match the product in question, this is a 2 nd order counterfeit. The customer can report this via the application on the mobile device (step 9h case 3).
  • time and geodata are also transmitted to the database and stored.
  • Software is used to check in the background whether it is theoretically possible that the data associated with a product can be genuine. For example, if a product is scanned in Hamburg at 9:35 a.m. on Nov. 11, 2035 and 4 minutes later in Los Angeles, there is a 100% probability of a 3 rd order counterfeit. This is also transmitted to the user and indicated visually and/or acoustically (step 9h case 4).
  • the customer has the possibility to take a photo of the product in its entirety after detection in a 10th step and enter it into a database via the mobile application. On the basis of this data a corresponding further processing is then carried out.
  • the CMYK data is scanned or otherwise digitized and transformed into the RGB color space.
  • the merging, shifting and/or combination of different halftone dots of different printing colors into dots during this transformation leads to an unreproducible change in the optically encoded image of the line number, which is significantly enhanced by the application of compression techniques such as JPEG image formats or similar.
  • the optically encrypted information in the image is deleted and it is not possible to convert it back into the identical CMYK data.
  • reprinting results in images that appear identical or similar to the human eye, the decoding process based on filter applications and transformations cannot recognize the serial number. The reason for the non-recognition is the presence of other information in the security-relevant areas.
  • CMYK complementary metal-oxide-semiconductor
  • filtering R G and/or B in different ranges of light wavelengths up to the IR or UV range, optionally using additional light sources such as flash or other light sources of the mobile application
  • additional light sources such as flash or other light sources of the mobile application
  • a printing of the data is not possible on the basis of this filtered and Fourier-transformed information, because only information 0 or 1 is available for the respective ranges.
  • step 7 can be followed by steps 8a to 10a:
  • the database DB1 is at least one database, at least one cloud and/or at least one blockchain in which the relevant information is stored completely, split and/or encrypted or open.
  • the information in DB1 can also provide links to other databases, clouds, blockchains, etc. from which information can be obtained via APIs or other interfaces.
  • FIG. 1 shows a schematic representation of an image
  • FIG. 2 shows a rotated halftone angle in the color black
  • FIG. 3 shows a rotated halftone angle in the color magenta.
  • FIG. 1 shows a schematic image A with a dot grid 1 .
  • lines arranged in parallel as halftone image have been used in the illustration for better representation.
  • the halftone image consists of dots which are arranged next to each other.
  • the image shows 5 fields F 1 to F 5 , wherein each field F 1 to F 5 has any geometrical shape or free form.
  • the fields F 1 , F 3 , F 4 and F 5 show a different orientation of the halftone image compared to image A.
  • Field F 2 has the same orientation of the halftone image as the halftone image of image A.
  • a binary representation can be generated in such a way that in case of a deviating orientation of the dots of the field F compared to the image A, a 1 or a 0 can be generated, depending on the previous definition.
  • a deviation generates a 1
  • the fields F 3 and F 4 can assume the values 2 and 3 respectively, due to the further modification.
  • a preferred case is the use of 4 colors CMYK and display of the serial number in the halftones for the colors black (K) according to FIG. 2 and magenta (M) according to FIG. 3 , with the halftone angles swapped between K and M in selected areas.

Abstract

A method for producing security elements in an image which are not visible to the human eye and which cannot be copied, in particular for checking the authenticity of images. The image is imaged by means of a halftone, the halftone consisting of individual image dots arranged adjacent to each other. This is characterized in that at least one field having a random geometric shape or freeform is defined in the image/the halftone. By means of manipulation of image dots in the field and/or by means of manipulation of the entire field, an encrypted information that cannot be copied is stored for comparison with at least one database and the serial number is displayed by means of contours formed in the halftone.

Description

CROSS REFERENCE TO RELATED APPLICATIONS
This application is the U.S. national stage of International Application No. PCT/DE2019/100575, filed on 2019 Jun. 22. The international application claims the priority of DE 102018115146.2 filed on 2018 Jun. 24; all applications are incorporated by reference herein in their entirety.
BACKGROUND
The invention relates to a method for producing security elements in an image which are not visible to the human eye and cannot be copied, as well as printed images according to the preamble of the first and eleventh claim.
Various objects of daily life such as branded products, clothing, documents, machine elements, food as well as value and identification documents are affected by counterfeiting and product piracy.
There are several prior-art solutions to prove the authenticity of products and to fight product piracy. Mostly barcodes, QR codes or RFIDs or NFCs are used for this purpose.
Besides the proof of originality of products by means of RFID or NFC, barcodes and QR codes, there are also visual marks such as holograms or laser engravings. Here, however, the proof of authenticity is usually only based on subjective recognition. The customer must decide for himself on the basis of trust whether the product, document or security is an original. This problem also exists when evaluating the authenticity of banknotes, which can only be analyzed for authenticity with additional technical applications. These disadvantages are avoided, for example, by DE 601 22 293 T2, which introduces magnetic markings into textile or leather products. These non-visible markings are firmly combined with the product and remain there for the entire product life. For this purpose, amorphous ferromagnetic fibers are used, which are implemented in the respective article by textile technology. A disadvantage of this solution is the possibility of imitation by identical incorporation of corresponding materials into such textiles or products. In addition, the metrological proof of authenticity is very complex, costly and therefore not very economical.
In the publication DE 101 18 679 A1, a method has been created to reduce the effort required for the insertion and verification of the security features. Ferromagnetic resonance-active substances are used for marking. The marker substance is either mixed into the product or combined with the product. By means of a special scanner the ferromagnetic substance is then measured and a statement about the authenticity of the product is made on the basis of the measurement results. By using different marker substances and attaching the substances at different places, a marking code can be created. This code can then be used to store further information on product or production process parameters. The disadvantage of this method is the high effort for the encryption of the information and the attachment of the code to the products. In addition, the respective coding points must be known when decoding the code and measuring and scanning devices specially suited for this application must be available.
The publication WO 03/007252 A1 describes a method in which a uniquely assigned random code is used to prove originality. This code is applied to the product or the corresponding packaging and stored in a central database. This central database is accessible via the internet and the customer can enter the corresponding code in an online mask after purchasing a product and thus inquire about the authenticity of the product. If the entered code is not contained in the database, it is a fake. If the code exists in the database and if the code has already been queried before, it is not possible to prove unequivocally which product is the original and whether the product was queried twice. A counterfeit of the product including the code cannot be excluded.
A more cost-effective solution for implementing copy protection is disclosed in the publication DE 10 2013 019 675 B3. This publication relates to a method for the acquisition and reproduction of information which is applied to the surface of information carriers of advertising and/or information media by means of display elements. The purpose of the invention is to enable digital communication by means of data elements on information carriers. For this purpose, representation elements of a textual and/or pictorial overall representation are recorded by means of a scanner and an encrypted connection code is decoded. On the basis of this connection code, the access to a database and the comparison of the identical existing physical information with the identical information in a database takes place. The disadvantage of this solution is that by copying the physical information and attaching it to a counterfeit product, the counterfeit product is recognized as original.
DE 10 2015 009 123 A1 publishes a method for checking the authenticity of the designation of origin and shelf-life indications of products. According to this teaching, a design surface with an individual security code and a mark is applied to the product. The individual security code can be decoded by a scanner. Afterwards a data connection to a database is established. In the database, the information on the mark and code is compared and a query code based on a mathematical formula is transmitted to the scanning device. Only if the mark, code and query code match, an original product is present. In order to prevent the generation of a fake, the scan code is renewed with every scan, so that only the scanning device that made the last scan knows the current scan code. The disadvantage of this solution is that the scan code must be transmitted separately from the original product. If the scan code is lost, the originality of the product can no longer be proven.
The publication DE 10 2015 006 008 A1 relates to an invention of a method for checking the authenticity of security features on printed and 3D value objects such as checks, vouchers and certificates. In this process, the security of the detection of forgeries is to be significantly increased above the level of the patents known from the prior art. In the first step, the value object is identified and it is defined where the security features are located on this value object. Afterwards, the two- and three-dimensional security features on the object are recorded by a camera. The determined values are then sent to a comparison station. The comparison station compares the detected features with the stored features. The comparison result is then sent back to the scanning device and a statement is made about the authenticity of the object. It is essential that the data is transmitted in encrypted form using a hash function and that at least one 3D security feature is attached to the value object. The procedure of this method is provided in several steps:
1. The edges of the value object are detected by means of the auto focus function. Afterwards, the optical elements within the edges (boundary surfaces) of the value object are captured and recorded in two dimensions. Afterwards, the display elements with security features are selected using predefined surfaces and patterns.
2. The selected features are compared with the stored values.
3. By moving the camera relative to the value object, several angles of the 3D features are recorded and detected.
4. The detected values are then compared with the security features in a comparison station.
The increase in security according to this publication is based on a code, which is produced by means of a coding device and to which value objects are additionally attached. This code is, for example, the serial number of the value object. The transmission of the code between the scanning device and the comparison station is carried out by means of another coding based on a hash function, so that the code cannot be counted back. In the comparison station, the value stored there by means of the identical hash function is then compared with the scanned value that is available as a hash value.
WO 2017/137155A1 describes a method for the verification of an object provided with a security feature, wherein the security element is manufactured in a multi-step process with register variations. For the register variation, a superposition of at least two dot or line grids is used. The resulting moiré grids are used to determine a check value which is compared with a reference value for verification. Preferably, several printing processes are used and check digits are stored in selected areas. In the case of grid manipulation, the creation of moiré structures, which can be read out optically, is used. The grid manipulation is realized by register variations at the printing press and is unavoidable due to the proposed use of different printing processes and serves as a kind of fingerprint to prove the authenticity of the respective print products. To prove authenticity, the banknote to be verified is photographed using a mobile computer device and a corresponding program (application). The serial number is then digitized by means of OCR recognition and the minimum and maximum distances of the register shift are used to determine the moiré grid and from this the check value of the banknote. The app then establishes a connection to a database and transfers the serial number and the check value to the database. In the database, the check value and the serial number are compared and the result of the test is transmitted back to the app, which displays the result of the authenticity check accordingly. It is also suggested to further secure the system by applying an additional barcode.
From the publication DE 10 2008 034 022 A1, a method is known for the production of security elements in an image which are invisible to the human eye and cannot be copied, in particular for checking the authenticity of images, wherein the image is reproduced by means of a halftone image. A solution, dispersion, emulsion or paste containing the luminescent substance and at least one binder is printed. With this solution, defined and predetermined patterns are to be generated by specific modification of the luminescence in partial areas of the marking layer, thus eliminating the need to determine a previously generated pattern for the purpose of determining the correlated character sequence. The change of the partial areas of the marking layer under illumination with visible light and in daylight intensity should not be perceptible with the human eye, but only determined with the help of technical aids, such as magnifying glasses, detectors, etc. In this process, a laser sweeps over the partial areas shown in a predetermined path, which in turn are determined by the predetermined path of the laser beam. Local pyrolysis occurs in the partial areas due to the strong absorption of the laser radiation in the laser-sensitive pigment and its immediate surroundings (diameter up to 10 μm around the center of a laser-sensitive pigment). This reduces the permittivity in the immediate vicinity of a laser-sensitive pigment with the result that an electroluminophore in this vicinity can no longer be excited to luminescence by an alternating electric field of the same frequency and intensity. As a result, the partial areas show a reduced electroluminescence compared to the other areas. Due to the control of the laser, the pyrolysis is locally limited as described, so that the pyrolyzed areas are practically imperceptible in normal daylight and with the human eye without technical aids.
In this solution, a chemical change of the printed layer is thus carried out in partial areas after printing by means of a laser.
In US 2013/0314 468 A1, modification is carried out by laser after printing.
The two solutions mentioned above mean a high additional expenditure by processing by means of a laser at high investment costs by the necessary laser.
The publication DE 10 2013 107 951A1 describes a method for verifying the authenticity of a document using at least one piece of additional information, wherein the document has an information feature that refers to the additional information. An image of the document is recorded, the information feature in the recorded image is recorded, the additional information is determined on the basis of the recorded information feature and the recorded image is displayed together with the additional information in order to verify the authenticity of the document.
This solution is not suitable for identifying products by their serial number.
SUMMARY
The invention involves a method for producing security elements in an image which are not visible to the human eye and which cannot be copied, in particular for checking the authenticity of images. The image is imaged by means of a halftone, the halftone consisting of individual image dots arranged adjacent to each other. This is characterized in that at least one field having a random geometric shape or freeform is defined in the image/the halftone. By means of manipulation of image dots in the field and/or by means of manipulation of the entire field, an encrypted information that cannot be copied is stored for comparison with at least one database and the serial number is displayed by means of contours formed in the halftone.
DETAILED DESCRIPTION
It is the object of the invention to develop a method for producing security elements in an image which are not visible to the human eye and cannot be copied, as well as methods for the proof of authenticity of products based on the comparison of dissimilar information, and a printed image which guarantees a reliable statement about the authenticity of a product.
This object is solved with the characteristic features of the first and eleventh claim.
Advantageous designs result from the subclaims.
In the method for the production of security elements in an image which are not visible to the human eye and cannot be copied, for the authenticity check of the image, the image is reproduced by means of a halftone image, wherein the halftone image consists of individual dots and, according to the invention, at least one field is defined in the image/halftone image, wherein, by means of manipulation of dots in the field and/or by means of manipulation of the entire field, encrypted information that cannot be copied is stored for comparison with at least one database and a serial number is represented by means of contours introduced into the halftone image, wherein each contour is assigned a digit of the serial number and wherein the serial number can be represented in any desired numerical system.
The image can be in the form of a company logo or as a supplementary representation.
The invention therefore relates to a system for the authentication of objects, wherein both the verification procedure and associated computer products for carrying out the authentication and the necessary security elements are provided with the objects to be secured.
Various objects of daily life such as branded products, clothing, documents, machine elements, food as well as value and identification documents are provided with a non-copyable security element. This means that the objects are uniquely identifiable and can no longer be duplicated or copied without permission. In the event of an attempted forgery, the security element is falsified and is no longer recognizable.
In the prior art, elaborate testing equipment is used for such authentication tests with already known security elements. For a simple and market-penetrating application, however, it is necessary that such authentication can be carried out easily and by anyone. For this purpose, the use of a cell phone connected to the internet and its camera is an optimal solution. Alternatively, similar products such as a digital camera, handheld, pads or similar with an internet connection can be used.
For this purpose, the invention represents an authentication method, which is a multi-step method that optically encrypts an at least binary serial number in an image by varying the screening of full and halftone areas in previously defined regions.
The image is produced using duplex, four- or multi-color printing or hexachrome printing, letterpress, gravure, planographic printing, through-printing, non-impact printing, 3D printing or a combination of at least two printing processes. For example, if 3D printing is layered, individual layers and/or partial areas may have a different structure, orientation or shape in the form of fields, which are used to store information for comparison with a database.
In the first step of the method, a graphic available as an RGB file or in another color space is rasterized in the RIP process to preferably 4 colors (C—Cyan, M—Magenta, Y—Yellow, K—Black). In the case of a single-color display, it is also sufficient to rasterize one color (for example, C or special colors such as G—Green). In addition, other special colors such as UV and IR colors (UV=ultraviolet IR=infrared; light in this spectral range cannot be recognized by the human eye) can also be used. In certain areas, however, detection via digital cameras (either directly or indirectly via a change in intensity in the RGB channels) is detectable. Alternatively, special colors, lacquers, luminescent colors or electromagnetically reacting colors can be used as a substitute or supplementary color component, wherein the maximum number is not limited.
After rasterization, in a second step, areas are defined for the optical application of a random or arbitrary serial number. The contour and size of the areas is completely free and can consist of circles and/or triangles, rectangles, trapeziums, squares, various polygons or freeform surfaces. Each area stands for one digit of the serial number. Which area stands for which position of the serial number is displayed in previously defined areas and the part of the serial number shown there. For this purpose, the sequence in which the individual digits of the serial number are merged and the hash function used for encryption is determined over at least one defined area by means of the parameters grid change and/or contour.
EX:
102 (from F1, F2, F3)=Sequence F1, F2, F3, F4, F5 and hash function alpha
001 (from F1, F2, F3)=Sequence F2, F2, F1, F4, F5 and hash function gamma
013 (from F1, F2, F3)=Sequence F5, F2, F1, F3, F4 and hash function alpha
In the third step the information of the serial number is displayed, which is binary in the preferred variant, i.e. the ranges can assume two states:
Grid inside a field is identical to grid outside a field or the area inside the field and outside differ. One of these states is defined in the binary procedure with a 0 (false), one state with a 1 (true). In the preferred case, the halftone angle of two of the four colors (CMYK) is partially exchanged. However, it is also possible to allow several variation states of the grids and thus to arrive at a quaternary, decimal or hexadecimal code, for example. Possible variations and/or combinations for modifying the halftone are
    • Exchange of the halftone angle between two or more colors
    • Change of the halftone angle of at least one color
    • Change of the running width or halftone frequency of the cross-line halftone of at least one color
    • Change of frequency for frequency-modulated halftones of at least one color
    • Change of amplitude for amplitude-modulated halftones of at least one color
    • Change of frequency for amplitude-modulated halftones of at least one color
    • Change of amplitude for frequency-modulated halftones of at least one color
    • Change of the surface area of dots of at least one color
    • Change of the contour of the dots of at least one color
    • Addition of at least one color (IR, UV or other special color or lacquer)
    • Exchange of at least one of the colors CMYK with another color (IR, UV or other special color or lacquer)
    • Replacing the color tones achieved by subtractive color mixing of the process colors with at least one special color or spot color
    • Change of the achromatic structure by replacing equal parts of the process colors CMY completely or partially with black (K) and/or an additional black tone
    • Change of the color composition when printing with more than four process colors, for example in hexachrome printing. For example, by replacing C and Y components with the process color G.
In the fourth step, the modified graphic is printed using a printing process such as ink jet, laser, offset, gravure, flexo, screen printing or similar, or other digital or analog printing techniques. The printing substrate can be chosen at will and ranges from paper to plastics and other natural materials such as wood, stone or artificially produced substrates. The form of the printing substrate is also freely selectable and ranges from thread-like structures such as yarns to 2D-structures like paper and foils to 3D structures like parts and components. This means that the manipulated CMYK data (preferably with partially exchanged K and M halftones) or correspondingly otherwise manipulated data sets in different color spaces or color combinations with further color combinations are sent to the printing device instead of the usual CMYK data created and screened from the print data or corresponding data sets in different color spaces with further color combinations.
The encryption and storage of the serial number takes place in parallel or at a later time to steps 1-4. For this purpose, in step 5 the at least binary serial number is transformed using a hash function. Which hash function is used was defined in step 2 and is part of the serial number. The at least one binary serial number and the transformed information (hash value) are then stored in at least one database and assigned to a container with a further serial number and supplemented by further product data (brand, name, production location, production time, size, color, text length, etc.).
In step 6 the container is filled. For this purpose, step 5 is carried out at least once. Preferably, however, this is carried out much more often, for example in the range of 4 k to 20 k, wherein there is no maximum number.
If the container is filled with hash values, the container itself is encrypted or transformed in a step 7. The so-called Merkle tree procedure is used here, i.e. two hash values of a serial number are always transformed with a defined hash function to a new hash value and thus combined. The resulting new hash value is stored in the database and then two already combined hash values of serial numbers are transformed again with a hash function (identical or changed). This step is repeated until a single hash value is available for the whole container. The encryption path and the hash functions used are also stored in the database and a so-called Merkle path of the container is created.
In an eighth step, this final hash value of the container is written to at least one blockchain (preferably a public blockchain). With this step, the unalterable storage of the container hash value is completed and each person can publicly read out which hash values exist from the container. Since the hash functions represent an asymmetric encryption and thus a transformation, it is not possible to infer from the publicly available container hash values the combined hash values of the Merkle tree or the hash values of the serial numbers or the respective serial numbers per se.
To prove the authenticity of products, the security feature printed in step 4 is recorded with a mobile device, such as a cell phone, camera, tablet, SmartWatch or similar, and further processed in respect of data processing in step 9. In the preferred variant, a cell phone is used for this purpose on which a special application (software) is installed or integrated into the firmware of the cell phone.
To prove authenticity, the app is opened or the camera function with integrated app is started and the security element is recorded in the form of a security feature. If the camera with integrated app is active in standby mode, it is sufficient for the camera to automatically detect the presence of a security feature.
After the security feature has been recognized, the RGB image is further processed in step 9a, i.e. a combination of color filters and transformations, such as Fourier transformations, is applied to determine the information content for each individual field of the security feature. In the binary case this is a 0 or 1 or true and false.
In step 9b), the first part of the serial number is determined in at least one field, which describes the structure of the serial number and the hash function used to transfer the serial number to the database.
Then, in step 9c, the serial number is composed according to step 9b and encrypted with the corresponding hash function in step 9d.
In the following step 9e, the transformed serial number is sent to the database and the Merkle path stored for this hash value is determined according to step 9f. The database consists either of a server accessible via the internet or of a combination of several servers or autonomously operating nodes (nods). The corresponding container hash is determined by the Merkle tree procedure in a step 9g.
In step 9h, the comparison with at least one blockchain is carried out, wherein it is checked whether the determined container hash is present there.
If the container hash is not present, the product is counterfeit and a corresponding error message is transmitted to the mobile device, which outputs this optically and/or acoustically (step 9h case 1).
If the container hash is contained in the blockchain, the information: “Product is genuine” is transmitted to the mobile device and this is displayed visually and/or acoustically. In an advantageous design, additional product parameters such as production date, production location, size, color, etc. are read from the database and transmitted to the mobile device as additional information (step 9h case 2).
The customer can now make a visual comparison with the product. If the data transmitted from the database does not match the product in question, this is a 2nd order counterfeit. The customer can report this via the application on the mobile device (step 9h case 3).
In addition to the transmission of the code to the database according to step 9e, time and geodata (coordinates) are also transmitted to the database and stored. Software is used to check in the background whether it is theoretically possible that the data associated with a product can be genuine. For example, if a product is scanned in Hamburg at 9:35 a.m. on Nov. 11, 2035 and 4 minutes later in Los Angeles, there is a 100% probability of a 3rd order counterfeit. This is also transmitted to the user and indicated visually and/or acoustically (step 9h case 4).
In the cases of 1st to 3rd order counterfeits, the customer has the possibility to take a photo of the product in its entirety after detection in a 10th step and enter it into a database via the mobile application. On the basis of this data a corresponding further processing is then carried out.
By exchanging the halftone angles of the colors black and magenta, the number of halftone dots in the areas of variation is identical to the other areas. The subtractive color mixing in the CMYK color space in combination with the max. resolution of the human eye leads to the fact that the exchange of the rasterization is not recognized. Furthermore, there is a multitude of other manipulations such as
    • change of the halftone angle in the range of e.g. +/−0.1° to +/−10°;
    • change of the running width or halftone frequency of the cross-line halftone in the range of, for example, +/−0.1% to +/−20%;
    • change of frequency for frequency-modulated halftones in the range of e.g. +/−0.1% to +/−20%;
    • change of amplitude for amplitude-modulated halftones in the range of e.g. +/−0.1% to +/−20%;
    • change of frequency for amplitude-modulated halftones in the range of e.g. +/−0.1% to +/−20;
    • change of amplitude for frequency-modulated halftones in the range of e.g. +/−0.1% to +/−20%;
    • change of the area content of the dots in the range of e.g. +/−0.1% to +/−20%;
    • change of the contour of the dots;
    • addition of colors (IR, UV or other special color or lacquer);
    • exchange of colors CMYK with other colors (IR, UV or other special color or lacquer);
    • replacing the color tones achieved by subtractive color mixing of process colors with special color(s) or spot color(s);
    • changing the achromatic structure by replacing equal parts of the process colors CMY completely or partially with black (K) and/or an additional black tone;
    • changing the color composition when printing with more than four process colors, for example in hexachrome printing. For example, by replacing C and Y components with the process color G;
which also cannot be perceived by the human eye.
In the event of an attempted forgery, the CMYK data is scanned or otherwise digitized and transformed into the RGB color space. The merging, shifting and/or combination of different halftone dots of different printing colors into dots during this transformation leads to an unreproducible change in the optically encoded image of the line number, which is significantly enhanced by the application of compression techniques such as JPEG image formats or similar. As a result, the optically encrypted information in the image is deleted and it is not possible to convert it back into the identical CMYK data. Although reprinting results in images that appear identical or similar to the human eye, the decoding process based on filter applications and transformations cannot recognize the serial number. The reason for the non-recognition is the presence of other information in the security-relevant areas.
The information present in the CMYK (or other color spaces described above) can only be recognized or decoded by filtering (R G and/or B in different ranges of light wavelengths up to the IR or UV range, optionally using additional light sources such as flash or other light sources of the mobile application) in combination with Fourier transformations. However, a printing of the data is not possible on the basis of this filtered and Fourier-transformed information, because only information 0 or 1 is available for the respective ranges.
The following is an example of how to compare the information:
  • 1. A random number is generated. This random number is preferably binary, but can also be of a different type. EX: 010010 and represents the serial number (1). In addition, serial number (1) is written into a database 1 (DB1) and combined there with further product and/or production process data or a link to a manufacturer database is established via an API or other interfaces.
  • 2. A hash function A.1 is used to transform the serial number (1) into a hash value (2). EX: from 010010 results 2FX3D. DB1 stores that serial number (1) was transformed with A.1 (if only one hash is used in the whole system, this information can be omitted).
  • 3. A container with a random ID (3) is created. EX: 011001. In DB1 it is checked whether the ID already exists, if so, a new number is generated.
  • 4. The container with the random ID (3) is filled with hashed product codes 2FX3D, etc. Also when creating each new product serial number (1), DB1 checks if it already exists. If yes, then a new serial number (1) is created and a new check is made to see if the serial number (1) exists in DB1.
  • 5. A hash function A.2 is applied to the entire container (3) or two hash values of the serial numbers are always combined by means of a hash function to a further hash value until a final container hash (4) EX: X3YAO is created. This ID (4) is written into a blockchain.
  • 6. The resulting Merkle path produced in the transformation by means of Merkle tree procedure is stored in DB1.
  • 7. The serial number (1) is applied to a product and read in by means of a scan app. EX: 010010
  • 8. In the app, the serial number is converted using a recognized hash function. EX: 010010→2FX3D
  • 9. The corresponding Merkle path is retrieved from DB1 and the container hash is determined using the hash value of the serial number (1) 2FX3D and Merkle path X3YAO.
  • 10. The app searches the at least one blockchain for the container hash X3YAO. If this value is stored in the blockchain, the serial number (1) 2FX3D is also part of the original container and real.
Alternatively, step 7 can be followed by steps 8a to 10a:
    • 8a) App connects to DB1 and sends hash value of serial number (2) to DB1
    • 9a) DB1 calculates the container hash based on (2) and the Merkle path (4)
    • 10a) DB1 checks if container hash is available in blockchain
    • 11a) If yes, then transfer the information “Product is genuine” to mobile device. If no, then the information “Product is counterfeit” is transmitted to the mobile device.
Procedure for Coding:
  • a) Rasterization of a graphic in the RGB color space (or another color space) in a hardware or software raster image process (RIP) into a CMYK halftone or into another printable color space consisting of more or less colors
  • b) Determination of the optical coding of the serial number, including:
    • a. Determination of the coding areas
    • b. Determination of the outer contours of the coding
    • c. Determination of the sequence in which the areas are arranged in sequence for coding
    • d. Determination of the hash function for the transformation of the serial number (1)
  • c) Creating the serial number (1.1) for the implementation in the graphic
  • d) Change of the rasterization according to the coding information of the serial number (1.1)
  • e) Printing the information.
Procedure for Scanning and Decoding
  • a) Recording of the print image (CMYK or other printable color space)
  • b) After recording, the data is available in the RGB color space or in another color space recognizable by optical systems such as camera systems Application of filters and Fourier transformation
  • d) Recognizing of fields/areas if there is information 0 or 1 (binary case) per code field and reading of the serial number (1.1). If halftones for several colors are varied or several variation possibilities are used, one value can be assumed for each color or variation. For all CMYK then for example B. 0, 1, 2, 3 when using special colors, further information states can be assumed for each special color.
  • e) Comparison with DB1 in which fields the information for the optical decoding (field contour, sequence and hash function) for serial number (1.1) is located
  • f) Determination of the decoding value
  • g) Determination of the serial number (1) and transformation of the serial number (1) using the corresponding hash function
  • h) Further processing of the hash value of the serial number (2).
The database DB1 is at least one database, at least one cloud and/or at least one blockchain in which the relevant information is stored completely, split and/or encrypted or open. The information in DB1 can also provide links to other databases, clouds, blockchains, etc. from which information can be obtained via APIs or other interfaces.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention is explained in more detail in the following by reference to an exemplary embodiment and associated drawings, wherein:
FIG. 1 shows a schematic representation of an image,
FIG. 2 shows a rotated halftone angle in the color black,
FIG. 3 shows a rotated halftone angle in the color magenta.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
FIG. 1 shows a schematic image A with a dot grid 1. To improve the display, lines arranged in parallel as halftone image have been used in the illustration for better representation. However, the halftone image consists of dots which are arranged next to each other. The image shows 5 fields F1 to F5, wherein each field F1 to F5 has any geometrical shape or free form.
By means of the fields F1 to F5, information can be displayed in image A. The human eye cannot recognize differences and does not perceive any fields in image A.
The fields F1, F3, F4 and F5 show a different orientation of the halftone image compared to image A. Field F2 has the same orientation of the halftone image as the halftone image of image A.
From the orientation of the dots a binary representation can be generated in such a way that in case of a deviating orientation of the dots of the field F compared to the image A, a 1 or a 0 can be generated, depending on the previous definition. In case a deviation generates a 1, this means that the field F2 generates a 0 and the fields F1, F3, F4 and F5 generate a 1, whereby a serial number can be represented binary. Beside the value 1, the fields F3 and F4 can assume the values 2 and 3 respectively, due to the further modification.
A preferred case is the use of 4 colors CMYK and display of the serial number in the halftones for the colors black (K) according to FIG. 2 and magenta (M) according to FIG. 3 , with the halftone angles swapped between K and M in selected areas.

Claims (14)

The invention claimed is:
1. A method for producing security elements in an image which are not visible to the human eye and which cannot be copied,
in particular for checking the authenticity of images,
the image being imaged by means of a halftone,
the halftone consisting of individual image dots arranged adjacent to each other,
comprising the steps that
at least one field having a random geometric shape or freeform is defined in the image/the halftone,
wherein, by means of manipulation of the entire field, an encrypted information that cannot be copied is stored for comparison with at least one database and
a serial number is displayed by means of contours formed in the halftone.
2. The method according to claim 1, wherein each contour is assigned at least one digit of the serial number.
3. The method according to claim 1, wherein the serial number can be represented in any number system.
4. The method according to claim 1, wherein the halftone is produced by duplex printing, four-color printing or multi-color printing or hexachrome printing, letterpress, gravure printing, planographic printing, through-printing, non-impact printing, 3D printing or a combination of at least two printing processes.
5. The method according to claim 1, wherein the serial number is represented at least in binary form,
wherein a deviation of the halftone within the defined field is detected as 1=true and an identical halftone within the field (F1 to F5) as 0=false or vice versa, depending on the previous definition.
6. The method according to claim 1, wherein information for decryption is stored in the serial number,
wherein the encryption is carried out with the aid of a hash function assigned to the serial number, and in that the hash function used is integrated in the serial number as information.
7. The method according to claim 1, wherein the dots in the halftone have at least one, preferably four colors,
wherein the manipulation of the dots and/or the fields is achieved by means of
exchanging the halftone angle between two or more colors and/or
changing the halftone angle of at least one color and/or
changing the running width or halftone frequency of the cross-line halftone of at least one color and/or
changing the frequency for frequency-modulated halftones of at least one color and/or
changing the amplitude for amplitude-modulated halftones of at least one color and/or
changing the frequency for amplitude-modulated halftones of at least one color and/or
changing the amplitude for frequency-modulated halftones of at least one color.
8. The method according to claim 1, wherein the dots in the halftone have at least one, preferably four colors,
wherein the manipulation of the dots and/or the fields is achieved by means of
changing the surface area of dots of at least one color and/or
changing the contour of the dots of at least one color.
9. The method according to claim 1, wherein the dots in the halftone have at least one, preferably four colors,
wherein the manipulation of the dots and/or the fields is achieved by means of
adding at least one color in form of infrared, ultraviolet or other special color or lacquer and/or
exchanging at least one of the colors in the CMYK color space with another color in the form of infrared, ultraviolet or other special color or lacquer and/or
replacing the color tones achieved by subtractive color mixing of the process colors with at least one special color or spot color and/or
changing the achromatic structure by replacing equal parts of the process colors CMY completely or partially with black (K) and/or an additional black tone and/or
changing the color composition when printing with more than four process colors.
10. The method according to claim 1, wherein the printing of the image is carried out by means of ink-jet, laser, offset, gravure, flexographic, or screen printing, and the printing is carried out on paper, plastics or other natural materials.
11. The method according to claim 1, wherein the serial number and a transformed code is stored in the form of a hash value in at least one database and assigned to a container with a serial number and supplemented by further product data,
wherein the product data comprises at least the brand and/or name and/or place of production and/or production time and/or size and/or color and/or text length.
12. The method according to claim 1, wherein the container is filled with hash values,
wherein the container itself is subsequently encrypted in such a way that the Merkle tree procedure is used,
wherein two hash values of a serial number are always combined with a defined hash function to form a new transformed code and the resulting new hash value is stored in the database and thereupon two already combined hash values of serial numbers are encrypted again with a hash function (identical or modified),
where this step is repeated until a hash value is available for the whole container, wherein the encryption path and the hash functions used are also stored in the database, which creates a Merkle path of the container.
13. The method according to claim 1, wherein the final hash value of the container is written to at least one blockchain.
14. The method according to claim 1, wherein the sequence for the coding is as follows:
a) rasterization of a graphic in RGB color space in a hardware or software raster image process (RIP) into a CMYK halftone or into another printable color space consisting of more or less colors
b) determination of the optical coding of the serial number, including:
a. determination of the areas for coding;
b. determination of the outer contours of the coding;
c. determination of the sequence in which the areas are arranged in sequence for coding;
d. determination of the hash function for the transformation of the serial number;
c) creation of the serial number for the implementation into the graphic;
d) changing the rasterization according to the coding information of the serial number;
e) printing the information;
and in that the sequence of scanning and decoding is as follows:
i) recording of the print image (CMYK or other printable color space);
j) after recording, the data is available in the RGB color space or in another color space recognizable by optical systems such as camera systems;
k) application of filters and Fourier transformation;
l) recognition of fields/areas if there is information 0 or 1 (binary case) per code field and reading of the serial number,
wherein in case of variation of the halftones for several colors or in case of using several variation possibilities per color or for each variation a value is assumed, and in case of using special colors further information states per special color;
m) comparison with DB1 in which fields the information for the optical decoding (field contour, sequence and hash function) for the serial number is located;
n) determination of the decoding value;
o) determination of the serial number and transformation of the serial number using the corresponding hash function;
p) further processing of the hash value of the serial number;
wherein the database DB1 is at least one database, at least one cloud and/or at least one blockchain in which the relevant information is stored completely, split and/or encrypted or openly,
wherein the information in DB1 can also represent links to further databases, clouds, blockchains from which information can be obtained via APIs or further interfaces.
US16/973,071 2018-06-24 2019-06-22 Method for producing security elements in an image which are not visible to the human eye and cannot be copied, and printed image Active US11715309B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE102018115146.2 2018-06-24
DE102018115146.2A DE102018115146A1 (en) 2018-06-24 2018-06-24 Process for producing security elements that are invisible to the human eye and cannot be copied in an image, and method for verifying the authenticity of products based on the comparison of unequal information and printed image
PCT/DE2019/100575 WO2020001695A1 (en) 2018-06-24 2019-06-22 Method for producing security elements in an image which are not visible to the human eye and cannot be copied, and printed image

Publications (2)

Publication Number Publication Date
US20210245542A1 US20210245542A1 (en) 2021-08-12
US11715309B2 true US11715309B2 (en) 2023-08-01

Family

ID=67539171

Family Applications (2)

Application Number Title Priority Date Filing Date
US16/973,072 Active US11587339B2 (en) 2018-06-24 2019-06-22 Method for reading a code stored in a halftone image and comparison with a retrievable value
US16/973,071 Active US11715309B2 (en) 2018-06-24 2019-06-22 Method for producing security elements in an image which are not visible to the human eye and cannot be copied, and printed image

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US16/973,072 Active US11587339B2 (en) 2018-06-24 2019-06-22 Method for reading a code stored in a halftone image and comparison with a retrievable value

Country Status (5)

Country Link
US (2) US11587339B2 (en)
EP (2) EP3791368A1 (en)
CN (2) CN112292716A (en)
DE (1) DE102018115146A1 (en)
WO (2) WO2020001695A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11724533B2 (en) 2018-04-06 2023-08-15 Esko-Graphics Imaging Gmbh System and process for persistent marking of flexo plates and plates marked therewith
CN112204463A (en) 2018-04-06 2021-01-08 埃斯科绘图成像有限责任公司 Method for permanently marking a flexographic printing plate with workflow information and plate marked therewith
DE102018115146A1 (en) * 2018-06-24 2019-12-24 Industry365 Ug (Haftungsbeschränkt) Process for producing security elements that are invisible to the human eye and cannot be copied in an image, and method for verifying the authenticity of products based on the comparison of unequal information and printed image
FR3085304B1 (en) 2018-08-31 2021-01-08 D Uniflexo PHOTOSENSITIVE PRINTER SHAPE FOR A FLEXOGRAPHIC PRINTING PROCESS INCLUDING VISIBLE AND NON-PRINTING INFORMATION, PROCESS FOR PREPARING SUCH A PRINTER SHAPE
EP3660770A1 (en) * 2018-11-30 2020-06-03 Mastercard International Incorporated Methods and systems for secure product tracking data storage and verification
WO2021069489A1 (en) 2019-10-07 2021-04-15 Esko-Graphics Imaging Gmbh System and process for persistent marking of flexo plates and plates marked therewith
CN116569228A (en) 2020-11-12 2023-08-08 尤尼卡系统股份有限公司 Method for printing and identifying a raster-printed authentication mark with amplitude modulation

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1234521A (en) 1998-01-12 1999-11-10 朱拉特拉德有限公司 Anti-counterfeiting method and apparatus using digital screening
US20020054355A1 (en) * 2000-10-11 2002-05-09 Brunk Hugh L. Halftone watermarking and related applications
DE10118679A1 (en) 2001-04-14 2002-10-24 Henkel Kgaa Process for identifying or authenticating a marked object comprises detecting the ferromagnetic resonance of at least one ferromagnetic-resonance active marker substance
WO2003007252A1 (en) 2001-06-20 2003-01-23 Kezzler As Method for generation of authentication information and use thereof
WO2005011920A1 (en) 2003-07-28 2005-02-10 Irwin Industrial Tools Gmbh Vice
DE102008034022A1 (en) 2008-07-16 2010-01-21 Merck Patent Gmbh Method for producing a security and / or value product with subregions with different luminescence emission
CN102407703A (en) 2010-09-25 2012-04-11 天津市阿波罗信息技术有限公司 Another processing method for digitized anti-fake printing
US20130314468A1 (en) 2012-05-22 2013-11-28 Juan Manuel Jimenez Detecting media type using carriage-coupled sensor
US20130314486A1 (en) 2010-11-08 2013-11-28 U-Nica Technology Ag Method and device for producing colour images by way of a uv laser on pigmented substrates, and products produced as a result
DE102013019675B3 (en) 2013-05-29 2014-11-27 Wolfgang Beyer System and method for the retrievable storage, recording and reproduction of information of the advertising and information media
DE102013107951A1 (en) 2013-07-25 2015-01-29 Bundesdruckerei Gmbh Procedure for verifying the authenticity of a document
US20150036890A1 (en) * 2012-02-15 2015-02-05 Glenisys Kft. Security Element and Method to Inspect Authenticity of a Print
DE102015006008A1 (en) 2015-05-13 2016-11-17 Wolfgang Beyer Method for checking the authenticity of security features on value objects
DE102015009123A1 (en) 2015-07-20 2017-01-26 Wolfgang Beyer Procedure for checking the authenticity of the indication of origin and the shelf life of products
CN106407795A (en) 2016-09-05 2017-02-15 北京众享比特科技有限公司 Data existence authentication system, authentication method and verification method
DE102016001464A1 (en) 2016-02-09 2017-08-10 Giesecke & Devrient Gmbh Verification of an item provided with a security element
US20210248369A1 (en) * 2018-06-24 2021-08-12 Industry 365 UG (Haftungsbeschränkt) Method for Checking the Authenticity of Products and Printed Image

Family Cites Families (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7394573B1 (en) * 1999-04-14 2008-07-01 Xerox Corporation System for authenticating hardcopy documents
FR2805618B1 (en) 2000-02-29 2002-04-12 Commissariat Energie Atomique SYSTEM FOR AUTHENTICATING MANUFACTURED ARTICLES WITH MAGNETIC MARKINGS, AND METHOD FOR MARKING SUCH ARTICLES
US20030197878A1 (en) * 2002-04-17 2003-10-23 Eric Metois Data encoding and workpiece authentication using halftone information
US7751608B2 (en) * 2004-06-30 2010-07-06 Ecole Polytechnique Federale De Lausanne (Epfl) Model-based synthesis of band moire images for authenticating security documents and valuable products
DE10328328B4 (en) * 2003-06-25 2015-06-03 TÜV Rheinland Holding AG Product protection portal and method for checking the authenticity of products
DE102005008135A1 (en) * 2005-02-21 2006-08-31 Giesecke & Devrient Gmbh Disk with halftone image
CN101537751B (en) * 2009-04-10 2015-03-18 顾泽苍 Novel method for processing anti-counterfeit printing
KR101114542B1 (en) * 2009-10-28 2012-02-27 (주)이컴앤드시스템 Discrimination method and apparatus for forgery of wertpapier, and Recording medium thereof
JP2011103023A (en) * 2009-11-10 2011-05-26 B-Core Inc Method and device for reading color arrangement code
CN101727593B (en) * 2009-11-20 2014-07-23 天津市阿波罗信息技术有限公司 Method for processing digitalized paper card
MX2013004043A (en) * 2010-10-11 2013-10-03 Graphic Security Systems Corp Method for constructing a composite image incorporating a hidden authentication image.
JP5721101B2 (en) * 2011-04-21 2015-05-20 独立行政法人 国立印刷局 Halftone print and method for producing the same
JP5678364B2 (en) * 2011-09-22 2015-03-04 独立行政法人 国立印刷局 Printed material capable of authenticating authenticity, manufacturing apparatus and manufacturing method thereof, authentication apparatus for printed matter capable of authenticating authenticity and authentication method thereof
DE102011120848B3 (en) * 2011-12-09 2013-05-23 Giesecke & Devrient Gmbh Security element for valuable objects e.g. chipcard, has plastic substrate comprising color layer that is embedded with magnetic particle, where portion of particle is arranged proximity of limiting surface between covering and color layers
US9361516B2 (en) * 2012-02-09 2016-06-07 Hewlett-Packard Development Company, L.P. Forensic verification utilizing halftone boundaries
US8824733B2 (en) * 2012-03-26 2014-09-02 Tk Holdings Inc. Range-cued object segmentation system and method
JP5344328B1 (en) * 2012-10-01 2013-11-20 健治 吉田 Dot pattern, dot pattern forming medium, dot pattern image data generating program, dot pattern forming device, optical device, optical reader, information input / output device, dot pattern reader
JP5822411B2 (en) * 2013-08-12 2015-11-24 株式会社アポロジャパン Image information code conversion apparatus, image information code conversion method, image related information providing system using image code, image information code conversion program, and recording medium recording the program
EP2920717A4 (en) * 2014-02-04 2015-12-09 Moshe Koren System for authenticating items
CN103997591A (en) * 2014-05-09 2014-08-20 佛山市绿之彩印刷有限公司 Invisible code graphics, processing method thereof and anti-fake application
CN106156821A (en) * 2015-03-24 2016-11-23 天津市阿波罗信息技术有限公司 A kind of optical readability bar code anti-counterfeit structure and implementation method
EP3281183B1 (en) * 2015-04-09 2022-07-13 FiliGrade B.V. Method of verifying an authenticity of a printed item and data processing terminal
EA031834B1 (en) * 2015-07-01 2019-02-28 Дмитрий Маринкин Method for identifying authenticity of an item having security marking on its surface
CN106886811A (en) * 2015-12-10 2017-06-23 顾泽苍 A kind of constructive method and reading method of mobile phone commodity false proof mark
CN106372533B (en) * 2016-09-14 2020-04-21 中国银联股份有限公司 Content storage method based on block chain technology
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
US10417409B2 (en) * 2017-03-21 2019-09-17 Hid Global Corp. Securing credentials with optical security features formed by quasi-random optical characteristics of credential substrates
CN107798372B (en) * 2017-11-24 2021-05-11 深圳市裕同包装科技股份有限公司 Encoding method, decoding method and decoding system of product information dot matrix image
US10261846B1 (en) * 2018-02-09 2019-04-16 Banjo, Inc. Storing and verifying the integrity of event related data

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1048168A1 (en) 1998-01-12 2000-11-02 Jura-Trade Kereskedelmi KFT Anti-counterfeiting method and apparatus using digital screening
CN1234521A (en) 1998-01-12 1999-11-10 朱拉特拉德有限公司 Anti-counterfeiting method and apparatus using digital screening
US20020054355A1 (en) * 2000-10-11 2002-05-09 Brunk Hugh L. Halftone watermarking and related applications
DE10118679A1 (en) 2001-04-14 2002-10-24 Henkel Kgaa Process for identifying or authenticating a marked object comprises detecting the ferromagnetic resonance of at least one ferromagnetic-resonance active marker substance
WO2003007252A1 (en) 2001-06-20 2003-01-23 Kezzler As Method for generation of authentication information and use thereof
WO2005011920A1 (en) 2003-07-28 2005-02-10 Irwin Industrial Tools Gmbh Vice
DE102008034022A1 (en) 2008-07-16 2010-01-21 Merck Patent Gmbh Method for producing a security and / or value product with subregions with different luminescence emission
CN102407703A (en) 2010-09-25 2012-04-11 天津市阿波罗信息技术有限公司 Another processing method for digitized anti-fake printing
US20130314486A1 (en) 2010-11-08 2013-11-28 U-Nica Technology Ag Method and device for producing colour images by way of a uv laser on pigmented substrates, and products produced as a result
US20150036890A1 (en) * 2012-02-15 2015-02-05 Glenisys Kft. Security Element and Method to Inspect Authenticity of a Print
US20130314468A1 (en) 2012-05-22 2013-11-28 Juan Manuel Jimenez Detecting media type using carriage-coupled sensor
DE102013019675B3 (en) 2013-05-29 2014-11-27 Wolfgang Beyer System and method for the retrievable storage, recording and reproduction of information of the advertising and information media
DE102013107951A1 (en) 2013-07-25 2015-01-29 Bundesdruckerei Gmbh Procedure for verifying the authenticity of a document
DE102015006008A1 (en) 2015-05-13 2016-11-17 Wolfgang Beyer Method for checking the authenticity of security features on value objects
DE102015009123A1 (en) 2015-07-20 2017-01-26 Wolfgang Beyer Procedure for checking the authenticity of the indication of origin and the shelf life of products
DE102016001464A1 (en) 2016-02-09 2017-08-10 Giesecke & Devrient Gmbh Verification of an item provided with a security element
WO2017137155A1 (en) 2016-02-09 2017-08-17 Giesecke & Devrient Gmbh Verification of an object provided with a security element
CN106407795A (en) 2016-09-05 2017-02-15 北京众享比特科技有限公司 Data existence authentication system, authentication method and verification method
US20210248369A1 (en) * 2018-06-24 2021-08-12 Industry 365 UG (Haftungsbeschränkt) Method for Checking the Authenticity of Products and Printed Image

Also Published As

Publication number Publication date
CN112313716B (en) 2023-05-26
DE102018115146A1 (en) 2019-12-24
US20210245542A1 (en) 2021-08-12
WO2020001695A1 (en) 2020-01-02
EP3791368A1 (en) 2021-03-17
EP3791367A1 (en) 2021-03-17
US20210248369A1 (en) 2021-08-12
CN112292716A (en) 2021-01-29
WO2020001696A1 (en) 2020-01-02
US11587339B2 (en) 2023-02-21
CN112313716A (en) 2021-02-02
WO2020001695A4 (en) 2020-02-20

Similar Documents

Publication Publication Date Title
US11715309B2 (en) Method for producing security elements in an image which are not visible to the human eye and cannot be copied, and printed image
JP4898999B2 (en) Printed matter, detection method and detection device for the printed matter, and authentication method and authentication device
US6985607B2 (en) System and method for authenticating objects
KR20030019398A (en) System and method for productiion and authentication of original documents
RU2746027C2 (en) Method for checking the authenticity of a printed product and data processing terminal
JP2015515388A (en) Security element and method of checking the authenticity of the stamp
JP5799425B2 (en) Printed material capable of authenticating authenticity, manufacturing apparatus and manufacturing method thereof, authentication apparatus for printed matter capable of authenticating authenticity and authentication method thereof
CN109376833B (en) Triple anti-counterfeiting two-dimensional code for pseudo-random information overprinting digital fluorescent image
JP4352168B2 (en) Halftone image data authentication program, halftone print authentication system, and halftone image data authentication system
JP5768236B2 (en) Anti-counterfeit printed matter, anti-counterfeit printed material preparation apparatus, and anti-counterfeit printed matter preparation method
CN109711513B (en) Triple anti-counterfeiting two-dimensional code with double-code of digital fluorescent image overprinting bright and dark
JP5990791B2 (en) Anti-counterfeit printed matter
JP2006295893A (en) Printed matter formation method, printed matter forming instrument, authenticity discrimination method, authenticity discrimination instrument, and printed matter
CN107209970A (en) Based on manufacture be related to different process relative position change measurement come confirm and certification safety document method
KR102500424B1 (en) How to verify security devices containing signatures
US20220150378A1 (en) Method of Printing Authentication Indicators with Amplitude Modulated Halftone Printing
Tkachenko Generation and analysis of graphical codes using textured patterns for printed document authentication
JP5678364B2 (en) Printed material capable of authenticating authenticity, manufacturing apparatus and manufacturing method thereof, authentication apparatus for printed matter capable of authenticating authenticity and authentication method thereof
JP4883457B2 (en) Printed material production method, printed material and authenticity determination method
RU2616448C1 (en) Method for producing valuable document, valuabl document and method for determining its authenticity
JP2022114031A (en) Device, method, and software for verifying authenticity of printed materials
CN116569228A (en) Method for printing and identifying a raster-printed authentication mark with amplitude modulation
CN109726789A (en) Hide the anti-fake two-dimension code of digital signature
JP2002157626A (en) Method and system for printed matter authentication, and printed matter with embedded identification information

Legal Events

Date Code Title Description
FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

AS Assignment

Owner name: INDUSTRY365 UG (HAFTUNGSBESCHRAENKT), GERMANY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KAUFMANN, JOERG;THEEG, FRANK;ZELLMER, HOLGER;SIGNING DATES FROM 20201201 TO 20201211;REEL/FRAME:054644/0049

STPP Information on status: patent application and granting procedure in general

Free format text: APPLICATION DISPATCHED FROM PREEXAM, NOT YET DOCKETED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

AS Assignment

Owner name: AUTHENTIC.NETWORK GMBH, GERMANY

Free format text: CHANGE OF NAME;ASSIGNOR:INDUSTRY365 UG (HAFTUNGSBESCHRAENKT);REEL/FRAME:060202/0316

Effective date: 20210722

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE